Remove Bandwidth Remove IP Address Remove Topology
article thumbnail

Why latency is the new outage

Kentik

Not as difficult as time travel, but it’s difficult enough so that for 30+ years IT professionals have tried to skirt the issue by adding more bandwidth between locations or by rolling out faster routers and switches. Over the last few decades network managers have focused on adding bandwidth and reducing the network outages.

TCP 116
article thumbnail

Why is Cisco ACI replacing traditional networks?

The Network DNA

spine-leaf topologies provide excessive-bandwidth, low-latency, non-blocking server-to-server connectivity. Adding spine switches increases fabric bandwidth. Adding leaf switches increases end point bandwidth. Let's look at the top nine benefits and characteristics of ACI as compared to traditional networks.

Network 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Network Also Needs to be Observable, Part 3: Network Telemetry Types

Kentik

Who did this IP address talk to? Why is my bandwidth bill so high? What users and applications are consuming my network bandwidth? How metadata lets you ask better questions: “Who did this IP address attack?” becomes “What users or hosts were attacked from this IP address? Am I under attack?

Network 72
article thumbnail

How to Configure Static Routes on Cisco

NW Kings

Unlike dynamic routes, learned through dynamic routing protocols such as OSPF (Open Shortest Path First) or EIGRP (Enhanced Interior Gateway Routing Protocol), static routes require the network administrator to specify the next hop or destination IP address. This feature in networks predicts and stabilizes the topology.

Routers 52
article thumbnail

Why is my SaaS application so slow?

Kentik

If you “ain’t afraid of getting dirty,” use the Wireshark packet analyzer to see if your connection to the SaaS applications’ IP address is suffering from any packet loss. If you’re working from home, could it be possible that you’re competing with other local devices for that precious, limited bandwidth?

article thumbnail

Securing Your Network Against Attacks: Prevent, Detect, and Mitigate Cyberthreats

Kentik

Cyberthreat strategies have evolved in step with modern cloud networks, often using cheap, virtualized cloud resources to exploit the threat surface topology I briefly described above. These attacks aim to overwhelm a service’s bandwidth capabilities with prohibitively high traffic volumes. Protocol-based. BGP route leak detection.

Network 94
article thumbnail

Network observability: Hype or reality?

Kentik

Why is my bandwidth bill so high? Port numbers and IP addresses are less useful in traffic analytics. In networking, this would mean that you can understand what’s going on in your network by interpreting the network’s telemetry data. And what configuration change caused this behavior? Observability is not a binary attribute.

Network 85